If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Jan 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 |
Mon, 11 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Deltaww
Deltaww diascreen |
|
| CPEs | cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Deltaww
Deltaww diascreen |
|
| Metrics |
ssvc
|
Mon, 11 Nov 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code. | |
| Title | Delta Electronics DIAScreen Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2024-11-11T14:53:13.470Z
Updated: 2024-11-11T16:06:36.044Z
Reserved: 2024-09-18T21:32:27.326Z
Link: CVE-2024-47131
Updated: 2024-11-11T16:06:23.992Z
Status : Analyzed
Published: 2024-11-11T15:15:06.153
Modified: 2025-01-30T14:35:10.020
Link: CVE-2024-47131
No data.